Description
The ElementsKit Elementor Addons plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the `Live_Action::reset()` function in all versions up to, and including, 3.8.2 The function is hooked to the WordPress `init` action and triggers when both `post` and `action=elementor` GET parameters are present, with no authentication or nonce verification. This makes it possible for unauthenticated attackers to overwrite the Elementor content (`_elementor_data`) of any `elementskit_widget` custom post type by visiting a specially crafted URL. The widget's custom designs, text, and configurations are permanently replaced with a blank template.
INFO
Published Date :
2026-05-05T04:27:56.288Z
Last Modified :
2026-05-05T04:27:56.288Z
Source :
Wordfence
AFFECTED PRODUCTS
The following products are affected by CVE-2026-4362 vulnerability.
| Vendors | Products |
|---|---|
| Roxnor |
|
| Wordpress |
|
REFERENCES
Here, you will find a curated list of external links that provide in-depth information to CVE-2026-4362.